mailing list archives
Re: DoS Attack against many RADIUS servers
From: David Frascone <dave () frascone com>
Date: Fri, 22 Feb 2002 12:07:51 -0600
This is a common problem with the way RADIUS does it's retransmissions.
Any flood of requests will cause the server to kill itself with the
UDP retransmissions. And, if requests take too long, the protocol will
break, since it can only have 254 (or is it 253) active requests alive at
any one given time. (A single character identifier)
That's why the IETF created Diameter, which will one day replace RADIUS,
and is not susceptable to this type of DoS attack.
On Thursday, 21 Feb 2002, Alan DeKok wrote:
There was a report recently to the maintainers of FreeRADIUS of a
DoS attack against it. For background, FreeRADIUS is a free software
RADIUS authentication, authorization, and accounting server.